{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:03:49Z","timestamp":1725865429780},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319462530"},{"type":"electronic","value":"9783319462547"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46254-7_13","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T10:04:13Z","timestamp":1474452253000},"page":"163-173","source":"Crossref","is-referenced-by-count":3,"title":["Predicting User Identity and Personality Traits from Mobile Sensor Data"],"prefix":"10.1007","author":[{"given":"Margit","family":"Antal","sequence":"first","affiliation":[]},{"given":"L\u00e1szl\u00f3 Zsolt","family":"Szab\u00f3","sequence":"additional","affiliation":[]},{"given":"Gy\u0151z\u0151","family":"Nemes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1177\/0956797609360756","volume":"21","author":"MD Back","year":"2010","unstructured":"Back, M.D., Stopfer, J.M., Vazire, S., Gaddis, S., Schmukle, S.C., Egloff, B., Gosling, S.D.: Facebook profiles reflect actual personality, not self-idealization. Psychol. Sci. 21(3), 372\u2013374 (2010)","journal-title":"Psychol. Sci."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Bo, C., Zhang, L., Li, X.Y., Huang, Q., Wang, Y.: Silentsense: Silent user identification via touch and movement behavioral biometrics. In: Proceedings of the 19th Annual International Conference on Mobile Computing; Networking, pp. 187\u2013190. MobiCom 2013, ACM (2013)","DOI":"10.1145\/2500423.2504572"},{"issue":"1","key":"13_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"2","key":"13_CR4","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.chb.2007.01.019","volume":"24","author":"S Butt","year":"2008","unstructured":"Butt, S., Phillips, J.G.: Personality and self reported mobile phone use. Comput. Hum. Behav. 24(2), 346\u2013360 (2008)","journal-title":"Comput. Hum. Behav."},{"issue":"8","key":"13_CR5","doi-asserted-by":"crossref","first-page":"1883","DOI":"10.1016\/S0191-8869(03)00037-0","volume":"35","author":"E Chico","year":"2003","unstructured":"Chico, E., Tous, J., Lorenzo-Seva, U., Vigil-Colet, A.: Spanish adaptation of dickman\u2019s impulsivity inventory: its relationship to eysenck\u2019s personality questionnaire. Pers. Individ. Differ. 35(8), 1883\u20131892 (2003)","journal-title":"Pers. Individ. Differ."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chittaranjan, G., Blom, J., Gatica-Perez, D.: Who\u2019s who with big-five: Analyzing and classifying personality traits with smartphones. In: 2011 15th Annual International Symposium on Wearable Computers (ISWC), pp. 29\u201336. IEEE (2011)","DOI":"10.1109\/ISWC.2011.29"},{"issue":"3","key":"13_CR7","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/s00779-011-0490-1","volume":"17","author":"G Chittaranjan","year":"2013","unstructured":"Chittaranjan, G., Blom, J., Gatica-Perez, D.: Mining large-scale smartphone data for personality studies. Pers. Ubiquit. Comput. 17(3), 433\u2013450 (2013)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"6","key":"13_CR8","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1016\/j.pmcj.2012.06.005","volume":"8","author":"CT Cornelius","year":"2012","unstructured":"Cornelius, C.T., Kotz, D.F.: Recognizing whether sensors are on the same body. Pervasive Mobile Comput. 8(6), 822\u2013836 (2012)","journal-title":"Pervasive Mobile Comput."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Counts, S., Stecher, K.B.: Self-presentation of personality during online profile creation. In: ICWSM, pp. 191\u2013194 (2009)","DOI":"10.1609\/icwsm.v3i1.13961"},{"issue":"6","key":"13_CR10","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.paid.2010.12.032","volume":"50","author":"C Dazzi","year":"2011","unstructured":"Dazzi, C.: The eysenck personality questionnaire-revised (epq-r): A confirmation of the factorial structure in the italian context. Pers. Individ. Differ. 50(6), 790\u2013794 (2011)","journal-title":"Pers. Individ. Differ."},{"key":"13_CR11","unstructured":"Eysenck, H.J., et al.: Manual of the eysenck personality scales (eps adult) (1991)"},{"key":"13_CR12","volume-title":"Manual of the Eysenck Personality Questionnaire (junior and adult)","author":"HJ Eysenck","year":"1975","unstructured":"Eysenck, H.J., Eysenck, S.B.G.: Manual of the Eysenck Personality Questionnaire (junior and adult). Hodder and Stoughton, London (1975)"},{"key":"13_CR13","unstructured":"Eysenck, H., Eysenck, M.: A natural science approach (1985)"},{"issue":"1","key":"13_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0191-8869(93)90168-3","volume":"14","author":"SB Eysenck","year":"1993","unstructured":"Eysenck, S.B., Barrett, P.T., Barnes, G.E.: A cross-cultural study of personality: Canada and england. Pers. Individ. Differ. 14(1), 1\u20139 (1993)","journal-title":"Pers. Individ. Differ."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Feng, T., Liu, Z., Kwon, K.A., Shi, W.: Continuous mobile authentication using touchscreen gestures. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 451\u2013456 (2012)","DOI":"10.1109\/THS.2012.6459891"},{"issue":"1","key":"13_CR16","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/TIFS.2012.2225048","volume":"8","author":"M Frank","year":"2013","unstructured":"Frank, M., Biedert, R., Ma, E., Martinovic, I., Song, D.: Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication. Inf. Forensics Secur. IEEE Trans. 8(1), 136\u2013148 (2013)","journal-title":"Inf. Forensics Secur. IEEE Trans."},{"issue":"1","key":"13_CR17","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"issue":"4","key":"13_CR18","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/S0747-5632(00)00017-0","volume":"16","author":"YA Hamburger","year":"2000","unstructured":"Hamburger, Y.A., Ben-Artzi, E.: The relationship between extraversion and neuroticism and the different uses of the internet. Comput. Human Behav. 16(4), 441\u2013449 (2000)","journal-title":"Comput. Human Behav."},{"key":"13_CR19","unstructured":"Li, L., Zhao, X., Xue, G.: Unobservable re-authentication for smartphones. In: NDSS. The Internet Society (2013)"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"de Montjoye, Y.A., Quoidbach, J., Robic, F., Pentland, A.S.: Predicting personality using novel mobile phone-based metrics. In: Social Computing, Behavioral-Cultural Modeling and Prediction, pp. 48\u201355. Springer (2013)","DOI":"10.1007\/978-3-642-37210-0_6"},{"issue":"6","key":"13_CR21","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1089\/cpb.2006.9.753","volume":"9","author":"JG Phillips","year":"2006","unstructured":"Phillips, J.G., Butt, S., Blaszczynski, A.: Personality and self-reported use of mobile phones for games. CyberPsychol. Behav. 9(6), 753\u2013758 (2006)","journal-title":"CyberPsychol. Behav."},{"issue":"2","key":"13_CR22","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.chb.2008.12.024","volume":"25","author":"C Ross","year":"2009","unstructured":"Ross, C., Orr, E.S., Sisic, M., Arseneault, J.M., Simmering, M.G., Orr, R.R.: Personality and motivations associated with facebook use. Comput. Hum. Behav. 25(2), 578\u2013586 (2009)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Roy, A., Halevi, T., Memon, N.: An hmm-based behavior modeling approach for continuous mobile authentication. In: 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 3789\u20133793, May 2014","DOI":"10.1109\/ICASSP.2014.6854310"},{"key":"13_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1024\/\/0170-1789.20.1.1","volume":"20","author":"W Ruch","year":"1999","unstructured":"Ruch, W.: Die revidierte fassung des eysenck personality questionnaire und die konstruktion des deutschen epq-r bzw. epq-rk. Z. f\u00fcr Differ. Diagnostische Psychol. 20, 1\u201314 (1999)","journal-title":"Z. f\u00fcr Differ. Diagnostische Psychol."},{"issue":"3f","key":"13_CR25","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.2466\/pr0.1991.69.3f.1091","volume":"69","author":"R Sanderman","year":"1991","unstructured":"Sanderman, R., Eysenck, S., Arrindell, W.: Cross-cultural comparisons of personality: The netherlands and england. Psychol. Reports 69(3f), 1091\u20131096 (1991)","journal-title":"Psychol. Reports"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Serwadda, A., Phoha, V., Wang, Z.: Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In: 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1\u20138 (2013)","DOI":"10.1109\/BTAS.2013.6712758"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it. In: Proceedings of the 19th Annual International Conference on Mobile Computing; Networking, pp. 39\u201350. ACM, New York, MobiCom 2013, NY, USA (2013)","DOI":"10.1145\/2500423.2500434"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Stecher, K.B., Counts, S.: Spontaneous inference of personality traits and effects on memory for online profiles. In: ICWSM, pp. 118\u2013126 (2008)","DOI":"10.1609\/icwsm.v2i1.18625"},{"issue":"2","key":"13_CR29","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.chb.2009.10.010","volume":"26","author":"LP Tosun","year":"2010","unstructured":"Tosun, L.P., Lajunen, T.: Does internet use reflect your personality? relationship between eysenck\u2019s personality dimensions and internet use. Comput. Hum. Behav. 26(2), 162\u2013167 (2010)","journal-title":"Comput. Hum. Behav."}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46254-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T06:02:45Z","timestamp":1692511365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46254-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319462530","9783319462547"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46254-7_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}